Post permalink

Well, my position is simple. YOU are in control of what is allowed to execute on your system. If you choose to run arbitrary unsigned binaries, that's
your decision. On Windows 7, you run as standard user by default. How many attacks have their been that exploit the UAC vulnerability you are touting? I've yet to hear about a
single instance. If UAC is so flawed, then why haven't hackers used it as an attack vector? Win 7 UAC has been in the wild for quite some time to date. Lots and lots of folks are running Win7 RC. Can you elaborate on the vulnerability?